Can Project Sonar, an Internet-scanning project, benefit enterprise network security? Expert Brad Casey discusses.
Sophisticated malware was behind the Michaels breach that resulted in three million compromised payment cards, according to the crafts retailer.
When it comes to app risk management, who is ultimately responsible: business leaders or security professionals? A new report weighs in.
Learn about bandwidth management vendor Websense's partner program in this standardized checklist.
Learn more about configuration control software vendor Tripwire, Inc.'s partner program in this standardized checklist.
This section of the chapter excerpt focuses on supporting multiple administrative levels of router configuration.
In this video interview, Ian Kilpatrick of Wick Hill discusses the IPv6 challenges that small and medium businesses are just beginning to address.
Apache has released an updated version of its Web server to address a DDoS vulnerability, for which exploit tools have been found in the wild.
Learn how a Web-based free spam-filtering service can secure email and prevent spam from attacking your enterprise.
When it comes to choosing an IaaS provider, don't be enticed by price drops. Your choice should be focused on partnering ability, not the lowest cost.
Dell and Red Hat have formed a PaaS coalition based on OpenShift, but enterprise deployments of such technologies are still few and far between.
OpenShift will make cloud developers using Git and Jenkins feel right at home. But for others, there are a few things to know.
Controlling who can access cloud-based applications can be tricky. The key is to grant enough access to some users, but not too much to others.
In this AWS Management Console series, learn five ways to create an S3 bucket policy.
Installing an application using AWS OpsWorks is simple -- just follow these four basic steps.
Using management tools is just one way to prevent sprawl in your VM environment. It's important to be proactive with your VMs to fight sprawl.
Even as the software-defined data center marches forward, there is still good reason to keep VMware vCenter Server physical.
There are plenty of free performance monitoring tools, but take care in how you interpret results to make sure you understand the big picture.
Without correct implementation and persistent monitoring, a resource pool can cause more problems than it solves.
Not all management tasks in a vSphere environment are handled from the vSphere client. Some require commands executed from ESXi Shell.
Starting with vSphere 5, VMware brought single sign-on functionality to vCenter to give administrators another way to manage identities.